Question

In: Computer Science

What is the basis of nonrepudiation and how is it commonly implemented? (Please be specific)

What is the basis of nonrepudiation and how is it commonly implemented? (Please be specific)

Solutions

Expert Solution

Non-repudiation is the capacity to guarantee that involved with an agreement or a correspondence can't prevent the validness from getting their mark on an archive or the sending of a message that they started. To disavow intends to deny. For a long time, specialists have looked to make renouncement incomprehensible in certain circumstances. You may send enrolled mail, for instance, so the beneficiary can't reject that a letter was conveyed. Also, an authoritative report commonly expects observers to marking with the goal that the individual who signs can't deny having done as such. On the Internet, a computerized mark is utilized not exclusively to guarantee that a message or record has been electronically marked by the individual that suspected to sign the archive, yet in addition, since an advanced mark must be made by one individual, to guarantee that an individual can't later reject that they outfitted the mark.

Since no security innovation is totally foul proof, a few specialists caution that a computerized signature alone may not generally ensure nonrepudiation. It is recommended that numerous methodologies be utilized, for example, catching extraordinary biometric data and other information about the sender or underwriter that all things considered would be hard to renounce. Email nonrepudiation includes strategies, for example, email following that are intended to guarantee that the sender can't deny having communicated something specific as well as that the beneficiary can't deny having gotten it.

Implementation of nonrepudiation ~

For email transmission, non-repudiation commonly includes utilizing techniques intended to guarantee that a sender can't deny having sent a specific message, or that a message beneficiary can't deny having gotten it. Strategies would incorporate email following.

Cryptographic hash functions might be utilized to build up the trustworthiness of sent archives. No encryption keys are included, and solid hash capacities are intended to be irreversible. Additionally, they're intended to dodge impact, which happens in the uncommon situations where two separate reports offer ascent to a similar hash esteem.

Taking this a phase further is HMAC, a procedure used to give information confirmation and trustworthiness through the hashing of a record and its transmission with a common encryption key. Notwithstanding, the very actuality that the key is a common one implies that this technique needs non-repudiation.


Related Solutions

Hypoglycemia is a symptom commonly observed in cirrhotic patients. What is the physiological basis for this?...
Hypoglycemia is a symptom commonly observed in cirrhotic patients. What is the physiological basis for this? How might this affect nutritional status?
At Zappos, the management function of “leading” is implemented in a very specific way. What are...
At Zappos, the management function of “leading” is implemented in a very specific way. What are the characteristics that are valued by Zappos in terms of management and leadership?
2. Caches are commonly implemented in SRAM, and the cache layout impacts the total amount of...
2. Caches are commonly implemented in SRAM, and the cache layout impacts the total amount of SRAM required to implement the cache. For the following two problems, assume the caches are byte addressable and addresses and data words are both 32 bits. a. How many total bits are required to implement a 128 KiB direct-mapped cache with 4-word blocks? [25 points] b. How many total bits are required to implement a 128 KiB direct-mapped cache with 32-word blocks? [25 points]
What is basis? How does basis link to hedging? How to forecast basis using last year’s...
What is basis? How does basis link to hedging? How to forecast basis using last year’s basis, three-year moving average basis, and five-year moving average basis? How to use forecasted basis to forecast the net price received/paid by hedging?
What is TQM? What are the components of TQM? How is TQM implemented? What are the...
What is TQM? What are the components of TQM? How is TQM implemented? What are the popular TQM initiatives? What are some of the Quality Monitoring/Control Tools?
What is a capital asset? What is basis? How is basis adjusted? What are some capital...
What is a capital asset? What is basis? How is basis adjusted? What are some capital assets that you have (list 10 that are not securities)? How would you be taxed on each asset if you were to sell it today?
Explain how to convert fund specific financials on a modified accrual accounting basis to a full...
Explain how to convert fund specific financials on a modified accrual accounting basis to a full accrual basis.
What is the payback period, how is it calculated, what weaknesses are commonly associated with the...
What is the payback period, how is it calculated, what weaknesses are commonly associated with the use of the payback period to evaluate a proposed investment? PLEASE MINIMUM 350 word.
How racism impacts society in general? Please be specific.
How racism impacts society in general? Please be specific.
Give an example of each a commonly owned substitute and commonly owned complement (please note the...
Give an example of each a commonly owned substitute and commonly owned complement (please note the spelling of complement, different from a compliment you give someone, a complement goes with something else, in geometry complementary angles sum together to equal ninety degrees). You must list the company owning (not a retailer selling two different products as the retailer only owns the inventory and not the brand) each product. For example, both Tide and Cheer laundry detergents are manufactured by Procter...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT